<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://infosecjourney.tech/2026/01/25/bots-in-cybersecurity-why-zero-trust-is-the-only-real-defense/</loc><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2026/01/copilot_20260125_194316.png</image:loc><image:title>Copilot_20260125_194316</image:title></image:image><lastmod>2026-01-26T00:49:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecjourney.tech/2026/01/04/understanding-cis-benchmarks-a-practical-guide-for-cloud-and-security-teams/</loc><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2026/01/understanding-cis-benchmarks.png</image:loc><image:title>Understanding CIS Benchmarks</image:title></image:image><lastmod>2026-01-05T00:13:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecjourney.tech/2025/07/27/trust-chains-and-digital-security-a-simplified-guide-to-pki-hierarchies/</loc><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/image-6.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-07-27T22:07:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecjourney.tech/2025/07/26/ensuring-compliance-with-records-information-management-rim-audit-ready-data-deletion-and-retention-practices/</loc><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/ensuring-compliance-with-records-information-management-rim_-audit-ready-data-deletion-and-retention-practices-provide-a-simple-image-.-dont-use-the-words-best-practices.-use-words-like-.jpg</image:loc><image:title>Ensuring Compliance with Records Information Management (RIM)_ Audit-Ready Data Deletion and Retention Practices - provide a simple image . dont use the words best practices. use words like Compliance, Audit-Ready Data Deletion and Retentio</image:title></image:image><lastmod>2025-07-26T15:36:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecjourney.tech/2025/07/23/web-application-security-addressing-the-bot-challenge/</loc><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/untitled-design-2.png</image:loc><image:title>Untitled design (2)</image:title></image:image><lastmod>2025-07-23T23:41:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecjourney.tech/2025/07/21/security-awareness-lapses-and-their-regulatory-implications/</loc><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/the-overlooked-link_-security-awareness-lapses-and-mandated-controls.jpg</image:loc><image:title>The Overlooked Link_ Security Awareness Lapses and Mandated Controls</image:title></image:image><lastmod>2025-07-21T18:08:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecjourney.tech/2025/07/20/compliance-in-context-cmmc-cui-and-fci-essentials/</loc><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/untitled-design-1.png</image:loc><image:title>Untitled design (1)</image:title></image:image><lastmod>2025-07-20T12:41:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecjourney.tech/2025/07/17/harden-and-monitor-fim-is-the-missing-link-in-container-security/</loc><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/create-a-highly-detailed-high-resolution-image-focusing-on-a-digital-17.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-focusing-on-a-digital</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/create-a-highly-detailed-high-resolution-image-focusing-on-a-digital-16.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-focusing-on-a-digital</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/create-a-highly-detailed-high-resolution-image-focusing-on-a-digital-15.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-focusing-on-a-digital</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/create-a-highly-detailed-high-resolution-image-focusing-on-a-digital-14.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-focusing-on-a-digital</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/create-a-highly-detailed-high-resolution-image-focusing-on-a-digital-13.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-focusing-on-a-digital</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/create-a-highly-detailed-high-resolution-image-focusing-on-a-digital-12.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-focusing-on-a-digital</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/create-a-highly-detailed-high-resolution-image-focusing-on-a-digital-11.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-focusing-on-a-digital</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/create-a-highly-detailed-high-resolution-image-focusing-on-a-digital-10.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-focusing-on-a-digital</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/create-a-highly-detailed-high-resolution-image-focusing-on-a-digital-9.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-focusing-on-a-digital</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/create-a-highly-detailed-high-resolution-image-focusing-on-a-digital-8.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-focusing-on-a-digital</image:title></image:image><lastmod>2025-07-18T02:10:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecjourney.tech/2025/07/12/why-open-source-license-handling-is-a-security-issue-not-just-a-legal-one/</loc><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/include-different-license-types-mit-bsd-apache-2-0gpl-agpllgpl-mpl-in-13.png</image:loc><image:title>include-different-license-types-mit-bsd-apache-2-0gpl-agpllgpl-mpl-in</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/include-different-license-types-mit-bsd-apache-2-0gpl-agpllgpl-mpl-in-12.png</image:loc><image:title>include-different-license-types-mit-bsd-apache-2-0gpl-agpllgpl-mpl-in</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/include-different-license-types-mit-bsd-apache-2-0gpl-agpllgpl-mpl-in-11.png</image:loc><image:title>include-different-license-types-mit-bsd-apache-2-0gpl-agpllgpl-mpl-in</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/include-different-license-types-mit-bsd-apache-2-0gpl-agpllgpl-mpl-in-10.png</image:loc><image:title>include-different-license-types-mit-bsd-apache-2-0gpl-agpllgpl-mpl-in</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/include-different-license-types-mit-bsd-apache-2-0gpl-agpllgpl-mpl-in-9.png</image:loc><image:title>include-different-license-types-mit-bsd-apache-2-0gpl-agpllgpl-mpl-in</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/include-different-license-types-mit-bsd-apache-2-0gpl-agpllgpl-mpl-in-8.png</image:loc><image:title>include-different-license-types-mit-bsd-apache-2-0gpl-agpllgpl-mpl-in</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/include-different-license-types-mit-bsd-apache-2-0gpl-agpllgpl-mpl-in-7.png</image:loc><image:title>include-different-license-types-mit-bsd-apache-2-0gpl-agpllgpl-mpl-in</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/include-different-license-types-mit-bsd-apache-2-0gpl-agpllgpl-mpl-in-6.png</image:loc><image:title>include-different-license-types-mit-bsd-apache-2-0gpl-agpllgpl-mpl-in</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/include-different-license-types-mit-bsd-apache-2-0gpl-agpllgpl-mpl-in-5.png</image:loc><image:title>include-different-license-types-mit-bsd-apache-2-0gpl-agpllgpl-mpl-in</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/include-different-license-types-mit-bsd-apache-2-0gpl-agpllgpl-mpl-in-4.png</image:loc><image:title>include-different-license-types-mit-bsd-apache-2-0gpl-agpllgpl-mpl-in</image:title></image:image><lastmod>2025-07-12T21:11:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecjourney.tech/2025/07/01/why-modern-wafs-must-secure-both-web-and-api-traffic/</loc><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/api-security-waf-4.png</image:loc><image:title>api-security-waf</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/api-security-waf-3.png</image:loc><image:title>api-security-waf</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/api-security-waf-2.png</image:loc><image:title>api-security-waf</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/api-security-waf-1.png</image:loc><image:title>api-security-waf</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/api-security-waf.png</image:loc><image:title>api-security-waf</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/why-modern-waf-must-secure-both-web-and-api-traffic-12.png</image:loc><image:title>why-modern-waf-must-secure-both-web-and-api-traffic</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/why-modern-waf-must-secure-both-web-and-api-traffic-11.png</image:loc><image:title>why-modern-waf-must-secure-both-web-and-api-traffic</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/why-modern-waf-must-secure-both-web-and-api-traffic-10.png</image:loc><image:title>why-modern-waf-must-secure-both-web-and-api-traffic</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/why-modern-waf-must-secure-both-web-and-api-traffic-9.png</image:loc><image:title>why-modern-waf-must-secure-both-web-and-api-traffic</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/why-modern-waf-must-secure-both-web-and-api-traffic-8.png</image:loc><image:title>why-modern-waf-must-secure-both-web-and-api-traffic</image:title></image:image><lastmod>2025-07-02T03:53:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecjourney.tech/2025/07/01/the-evolving-role-of-wafs-on-premises-vs-cloud-based-deployment/</loc><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/the-evolving-role-of-wafs-4.png</image:loc><image:title>the-evolving-role-of-wafs</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/the-evolving-role-of-wafs-3.png</image:loc><image:title>the-evolving-role-of-wafs</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/the-evolving-role-of-wafs-2.png</image:loc><image:title>the-evolving-role-of-wafs</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/the-evolving-role-of-wafs-1.png</image:loc><image:title>the-evolving-role-of-wafs</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/the-evolving-role-of-wafs.png</image:loc><image:title>the-evolving-role-of-wafs</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/the-evolving-role-of-wafs-on-premises-vs-cloud-based-waf-7.png</image:loc><image:title>the-evolving-role-of-wafs-on-premises-vs-cloud-based-waf</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/the-evolving-role-of-wafs-on-premises-vs-cloud-based-waf-6.png</image:loc><image:title>the-evolving-role-of-wafs-on-premises-vs-cloud-based-waf</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/the-evolving-role-of-wafs-on-premises-vs-cloud-based-waf-5.png</image:loc><image:title>the-evolving-role-of-wafs-on-premises-vs-cloud-based-waf</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/the-evolving-role-of-wafs-on-premises-vs-cloud-based-waf-4.png</image:loc><image:title>the-evolving-role-of-wafs-on-premises-vs-cloud-based-waf</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/07/the-evolving-role-of-wafs-on-premises-vs-cloud-based-waf-3.png</image:loc><image:title>the-evolving-role-of-wafs-on-premises-vs-cloud-based-waf</image:title></image:image><lastmod>2025-07-01T20:43:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecjourney.tech/2025/06/29/cvss-2-0-vs-cvss-3-0-why-the-upgrade-matters-and-whats-still-missing/</loc><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/cvss-vulnerability-management-8.png</image:loc><image:title>cvss-vulnerability-management</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/cvss-vulnerability-management-7.png</image:loc><image:title>cvss-vulnerability-management</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/cvss-vulnerability-management-6.png</image:loc><image:title>cvss-vulnerability-management</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/cvss-vulnerability-management-5.png</image:loc><image:title>cvss-vulnerability-management</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/cvss-vulnerability-management-4.png</image:loc><image:title>cvss-vulnerability-management</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/cvss-vulnerability-management-3.png</image:loc><image:title>cvss-vulnerability-management</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/cvss-vulnerability-management-2.png</image:loc><image:title>cvss-vulnerability-management</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/cvss-vulnerability-management-1.png</image:loc><image:title>cvss-vulnerability-management</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/cvss-vulnerability-management.png</image:loc><image:title>cvss-vulnerability-management</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/create-a-highly-detailed-high-resolution-image-that-visually-contrasts-cvss-3.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-that-visually-contrasts-cvss</image:title></image:image><lastmod>2025-06-29T04:10:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecjourney.tech/2025/06/27/rate-limiting-your-first-line-of-security-defense/</loc><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/rate-limiting-security-control-2.png</image:loc><image:title>rate-limiting-security-control</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/rate-limiting-security-control-1.png</image:loc><image:title>rate-limiting-security-control</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/rate-limiting-security-control.png</image:loc><image:title>rate-limiting-security-control</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/generate-a-highly-detailed-high-resolution-image-focused-on-the-concept-1.png</image:loc><image:title>generate-a-highly-detailed-high-resolution-image-focused-on-the-concept</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/generate-a-highly-detailed-high-resolution-image-focused-on-the-concept.png</image:loc><image:title>generate-a-highly-detailed-high-resolution-image-focused-on-the-concept</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/image-12.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-06-27T23:52:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecjourney.tech/2025/06/24/tls-1-3-in-focus-the-upgrade-your-enterprise-cant-ignore/</loc><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/tls-1-3-in-focus-the-upgrade-your-enterprise-cannot-miss-1.png</image:loc><image:title>tls-1-3-in-focus-the-upgrade-your-enterprise-cannot-miss</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/tls-1-3-in-focus-the-upgrade-your-enterprise-cannot-miss.png</image:loc><image:title>tls-1-3-in-focus-the-upgrade-your-enterprise-cannot-miss</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/tls-1-2-tls-1-3-7.png</image:loc><image:title>tls-1-2-tls-1-3</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/tls-1-2-tls-1-3-6.png</image:loc><image:title>tls-1-2-tls-1-3</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/tls-1-2-tls-1-3-5.png</image:loc><image:title>tls-1-2-tls-1-3</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/tls-1-2-tls-1-3-4.png</image:loc><image:title>tls-1-2-tls-1-3</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/tls-1-2-tls-1-3-3.png</image:loc><image:title>tls-1-2-tls-1-3</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/tls-1-2-tls-1-3-2.png</image:loc><image:title>tls-1-2-tls-1-3</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/tls-1-2-tls-1-3-1.png</image:loc><image:title>tls-1-2-tls-1-3</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/tls-1-2-tls-1-3.png</image:loc><image:title>tls-1-2-tls-1-3</image:title></image:image><lastmod>2025-06-26T02:56:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecjourney.tech/2025/06/25/why-group-policy-objects-gpos-cant-be-enforced-natively-on-linux-and-how-enterprises-manage/</loc><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/windows-linux-group-poliy-objects-1.png</image:loc><image:title>windows-linux-group-poliy-objects</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/windows-linux-group-poliy-objects.png</image:loc><image:title>windows-linux-group-poliy-objects</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/create-a-highly-detailed-high-resolution-featured-image-for-a-blog-5.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-for-a-blog</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/create-a-highly-detailed-high-resolution-featured-image-for-a-blog-2.png</image:loc><image:title>create-a-highly-detailed-high-resolution-featured-image-for-a-blog</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/image-10.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-06-26T02:43:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecjourney.tech/2025/06/23/from-siloed-tools-to-unified-defense-lessons-from-a-real-world-ransomware-incident/</loc><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/ransomware-edr-fim-siem-soar-7.png</image:loc><image:title>ransomware-edr-fim-siem-soar</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/ransomware-edr-fim-siem-soar-6.png</image:loc><image:title>ransomware-edr-fim-siem-soar</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/ransomware-edr-fim-siem-soar-5.png</image:loc><image:title>ransomware-edr-fim-siem-soar</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/ransomware-edr-fim-siem-soar-4.png</image:loc><image:title>ransomware-edr-fim-siem-soar</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/ransomware-edr-fim-siem-soar-3.png</image:loc><image:title>ransomware-edr-fim-siem-soar</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/ransomware-edr-fim-siem-soar-2.png</image:loc><image:title>ransomware-edr-fim-siem-soar</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/ransomware-edr-fim-siem-soar-1.png</image:loc><image:title>ransomware-edr-fim-siem-soar</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/ransomware-edr-fim-siem-soar.png</image:loc><image:title>ransomware-edr-fim-siem-soar</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/create-a-highly-detailed-high-resolution-image-illustrating-effective-data-correlation-4.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-illustrating-effective-data-correlation</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/create-a-highly-detailed-high-resolution-image-illustrating-effective-data-correlation-3.png</image:loc><image:title>create-a-highly-detailed-high-resolution-image-illustrating-effective-data-correlation</image:title></image:image><lastmod>2025-06-23T22:05:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecjourney.tech/2025/06/19/why-over-engineering-idm-can-hurt-your-business/</loc><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/why-over-engineering-idm-can-hurt-your-business-1.png</image:loc><image:title>why-over-engineering-idm-can-hurt-your-business</image:title></image:image><lastmod>2025-06-21T22:12:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecjourney.tech/2025/06/20/positioning-waf-and-ips-building-a-robust-security-posture-for-enterprise-applications/</loc><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/untitled-design.png</image:loc><image:title>Untitled design</image:title></image:image><lastmod>2025-06-20T17:34:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecjourney.tech/2025/06/17/taking-that-extra-step-my-way-of-verifying-security-configurations/</loc><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/create-a-highly-detailed-and-sharp-focused-featured-image-for-a.png</image:loc><image:title>create-a-highly-detailed-and-sharp-focused-featured-image-for-a</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-06-20T03:08:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecjourney.tech/2025/06/17/do-you-know-your-network-profile-windows-mac-and-linux-compared/</loc><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/create-a-windows-macos-and-linux-os-side-by-side-4.png</image:loc><image:title>create-a-windows-macos-and-linux-os-side-by-side</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/create-a-windows-macos-and-linux-os-side-by-side-3.png</image:loc><image:title>create-a-windows-macos-and-linux-os-side-by-side</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/create-a-windows-macos-and-linux-os-side-by-side-2.png</image:loc><image:title>create-a-windows-macos-and-linux-os-side-by-side</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/do-you-know-your-network-profile-windows-mac-and-linux-5.png</image:loc><image:title>do-you-know-your-network-profile-windows-mac-and-linux</image:title></image:image><lastmod>2025-06-18T23:01:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecjourney.tech/2025/06/16/security-is-a-journey-lessons-from-my-cybersecurity-exploration/</loc><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/security-is-a-journey-lessons-from-my-cybersecurity-exploration-1.png</image:loc><image:title>security-is-a-journey-lessons-from-my-cybersecurity-exploration</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/security-is-a-journey-lessons-from-my-cybersecurity-exploration.png</image:loc><image:title>security-is-a-journey-lessons-from-my-cybersecurity-exploration</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/image-2.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-06-18T22:54:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecjourney.tech/2025/06/18/thinking-about-moving-into-security-heres-what-you-need-to-know/</loc><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/are-you-considering-a-transition-into-the-security-domain-from-7.png</image:loc><image:title>are-you-considering-a-transition-into-the-security-domain-from</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/are-you-considering-a-transition-into-the-security-domain-from-6.png</image:loc><image:title>are-you-considering-a-transition-into-the-security-domain-from</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/are-you-considering-a-transition-into-the-security-domain-from-3.png</image:loc><image:title>are-you-considering-a-transition-into-the-security-domain-from</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/are-you-considering-a-transition-into-the-security-domain-from-2.png</image:loc><image:title>are-you-considering-a-transition-into-the-security-domain-from</image:title></image:image><image:image><image:loc>https://infosecjourney.tech/wp-content/uploads/2025/06/are-you-considering-a-transition-into-the-security-domain-from-1.png</image:loc><image:title>are-you-considering-a-transition-into-the-security-domain-from</image:title></image:image><lastmod>2025-06-18T22:12:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://infosecjourney.tech/about/</loc><lastmod>2025-06-17T22:02:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://infosecjourney.tech</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-01-26T00:49:10+00:00</lastmod></url></urlset>
